Search robots in disguise

There are plenty of bots out there and, as a result, some conventions have arisen.Well-behaved bots identify themselves with a unique user-agent.They also follow the robots.txt conventions, which allow webmasters to control how their sites are crawled.

Here at Live Search, our crawlers are identified by the user-agent ‘MSNBot’.This may seem a little non-intuitive, but many webmasters depend on this, and so we chosen not to change it.In order to make things a little more transparent, we also identify our different types of crawlers.The complete list is as follows:

But what about crawlers that aren’t so well-behaved?After all, anyone could call themselves ‘MSNBot’, and proceed to be as rude and aggressive as they like.Fortunately, there is a way you can catch these impersonators. Here is how it works:

When you get a page view request, it specifies a user-agent and an IP address.As I described above, all requests from Live Search use a user agent starting with the word ‘MSNBot’.

If you see the MSNBot user-agent, it’s time to check the identity of the bot.Starting with the IP address (i.e. 207.46.98.149), you can use reverse DNS lookup to find out the registered name of the machine.

Once you have the host name (in this case, msnbot-207-46-98-149.search.msn.com), you can check that it really is coming from Live Search.The name of all live search crawlers will end with ‘search.msn.com’.If the name doesn’t end with ‘search.msn.com’, you know it’s not really our crawler.

Finally, you need to verify that the name is accurate.In order to do this, you can use Forward DNS to see the IP address associated with the host name.This should match the IP address you used in Step 2 – if it doesn’t, it means the name was fake.

By verifying the crawler’s identity, you can catch masquerading crawlers.When you do catch one, you can simply return an HTTP Error, thus blocking them from seeing your content.

We are constantly looking for your feedback to help improve our engine – please send it our way using this link.